CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601)
- 15h 7m
- Gregory White, Wm. Arthur Conklin
- McGraw-Hill/Osborne
- 2021
Get complete coverage of all objectives included on the CompTIA Security+ exam SY0-601 from this comprehensive resource. Written by a team of leading information security experts, this authoritative guide fully addresses the skills required to perform essential security functions and to secure hardware, systems, and software. You’ll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the exam with ease, this definitive volume also serves as an essential on-the-job reference.
Covers all exam domains, including:
- Threats, Attacks, and Vulnerabilities
- Architecture and Design
- Implementation
- Operations and Incident Response
- Governance, Risk, and Compliance
About the Authors
Roger L. Davis is a Senior Internal Audit Manager at NuSkin Enterprises and is responsible for evaluating global business operations in over 35 countries. He is a retired Air Force Colonel with over 20 years of military and information security experience. Mr. Davis is a Certified Information Systems Security Professional (CISSP) and holds a Master’s Degree in Computer Science from George Washington University.
Greg White (San Antonio, TX), CompTIA Security+, CISSP, is an Associate Professor in the Department of Computer Science at the University of Texas at San Antonio. Dr. White is the Director of the Center for Infrastructure Assurance and Security at UTSA.
Chuck Cothren is a Research Scientist at University of Texas at San Antonio (UTSA) Center for Infrastructure Assurance and Security (CIAS) and currently serves on the Information Security Association’s Alamo Chapter Board of Directors. Mr. Cothren has a wide array of security experience including performing controlled penetration testing, network security policies, computer intrusion forensics, and computer training. He is a Certified Information Systems Security Professional (CISSP) and has co-authored other McGraw-Hill/Osborne titles. Mr. Cothren holds a B.S. in Industrial Distribution from Texas A&M University.
In this Book
-
Introduction
-
Social Engineering Techniques
-
Type of Attack Indicators
-
Application Attack Indicators
-
Network Attack Indicators
-
Threat Actors, Vectors, and Intelligence Sources
-
Vulnerabilities
-
Security Assessments
-
Penetration Testing
-
Enterprise Security Architecture
-
Virtualization and Cloud Security
-
Secure Application Development, Deployment, and Automation Concepts
-
Authentication and Authorization
-
Cybersecurity Resilience
-
Embedded and Specialized Systems
-
Physical Security Controls
-
Cryptographic Concepts
-
Secure Protocols
-
Host and Application Security
-
Secure Network Design
-
Wireless Security
-
Secure Mobile Solutions
-
Implementing Cloud Security
-
Identity and Account Management Controls
-
Implement Authentication and Authorization
-
Public Key Infrastructure
-
Tools/Assess Organizational Security
-
Incident Response Policies, Processes, and Procedures
-
Investigations
-
Mitigation Techniques and Controls
-
Digital Forensics
-
Security Controls
-
Regulations, Standards, and Frameworks
-
Organizational Policies
-
Risk Management
-
Privacy